{"id":"CVE-2023-28859","details":"redis-py before 4.4.4 and 4.5.x before 4.5.4 leaves a connection open after canceling an async Redis command at an inopportune time, and can send response data to the client of an unrelated request. (This could, for example, happen for a non-pipeline operation.) NOTE: the solutions for CVE-2023-28859 address data leakage across AsyncIO connections in general.","aliases":["GHSA-8fww-64cx-x8p5","PYSEC-2023-46"],"modified":"2026-03-23T04:59:24.474670Z","published":"2023-03-26T19:15:06.850Z","related":["SUSE-SU-2024:1639-1","SUSE-SU-2024:1639-2","openSUSE-SU-2024:12873-1"],"references":[{"type":"ADVISORY","url":"https://github.com/redis/redis-py/pull/2666"},{"type":"ADVISORY","url":"https://github.com/redis/redis-py/releases/tag/v4.4.4"},{"type":"ADVISORY","url":"https://github.com/redis/redis-py/releases/tag/v4.5.4"},{"type":"FIX","url":"https://github.com/redis/redis-py/issues/2665"},{"type":"FIX","url":"https://github.com/redis/redis-py/pull/2641"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/redis/redis-py","events":[{"introduced":"ef4caf5b8bd55fc5c3ca7d994e2047e046f7e942"},{"fixed":"49d9cb751c7c30546fc86d11f8168d7aa007edae"},{"introduced":"5cb5712d283fa8fb300abc9d71a61c1a81de5643"},{"fixed":"e1017fd77afd2f56dca90f986fc82e398e518a26"}],"database_specific":{"versions":[{"introduced":"4.2.0"},{"fixed":"4.4.4"},{"introduced":"4.5.0"},{"fixed":"4.5.4"}]}}],"versions":["v4.2.0","v4.2.1","v4.2.2","v4.3.0","v4.3.1","v4.3.2","v4.3.3","v4.3.4","v4.4.0","v4.4.0rc1","v4.4.0rc2","v4.4.0rc3","v4.4.0rc4","v4.4.1","v4.4.2","v4.4.3","v4.5.0","v4.5.1","v4.5.2","v4.5.3"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-28859.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}]}